Combating Cyber Terrorism-Assessment of Log for Malicious Signatures

Download Now
Provided by: Science Productions
Topic: Security
Format: PDF
Enhancing security to the networks and preventing the cyber attacks is a major issue in all domains. In this paper, a new class of cyber terrorism is addressed where mischievous and malicious behavior is the root cause for the modification of network data stored in an open database. An attempt is made in this study to develop an algorithm that screens network, database results and detects anomalies in the input data that could have been revised by cyber-attacks, that is cyber terrorism.
Download Now

Find By Topic